Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses : XSS --> Category: attack

PostNuke op and module Parameters Cross-Site Scripting Vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Checks for op and module parameters cross-site scripting vulnerabilities in PostNuke

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP script that is prone to cross-
site scripting attacks.

Description :

The version of PostNuke installed on the remote host fails to properly
sanitize user input through the 'op' parameter of the 'user.php'
script and the 'module' parameter of the 'admin.php' script before
using it in dynamically generated content. A possible hacker can exploit
this flaw to inject arbitrary HTML and script code into the browser of
unsuspecting users, leading to disclosure of session cookies and the
like.

See also :

http://archives.neohapsis.com/archives/bugtraq/2005-04/0112.html
http://community.postnuke.com/Article2679.htm

Solution :

Upgrade to version 0.760 RC4 or later.

Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:H/Au:NR/C:N/A:N/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.